Language:
https://www.zerodayinitiative.com/advisories/ZDI-12-142/
https://www.securityfocus.com/archive/1/523937/30/0/threaded
http://schierlm.users.sourceforge.net/CVE-2012-1723.html
http://www.nessus.org/u?a7ee4d1d
https://www.oracle.com/technetwork/java/javase/7u5-relnotes-1653274.html
https://www.oracle.com/technetwork/java/javase/6u33-relnotes-1653258.html
Severity: Critical
ID: 59462
File Name: oracle_java_cpu_jun_2012.nasl
Version: 1.21
Type: local
Agent: windows
Family: Windows
Published: 6/13/2012
Updated: 4/11/2022
Configuration: Enable thorough checks
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2012-1725
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:oracle:jre
Required KB Items: SMB/Java/JRE/Installed
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/12/2012
Vulnerability Publication Date: 6/12/2012
CISA Known Exploited Vulnerability Due Dates: 3/24/2022
Core Impact
Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)
CVE: CVE-2012-0551, CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725, CVE-2012-1726
BID: 53946, 53947, 53948, 53949, 53950, 53951, 53952, 53953, 53954, 53956, 53958, 53959, 53960